Jump to content

itman

Most Valued Members
  • Content Count

    7,578
  • Joined

  • Last visited

  • Days Won

    190

itman last won the day on January 17

itman had the most liked content!

About itman

  • Rank
    Expert

Profile Information

  • Gender
    Male
  • Location
    USA

Recent Profile Visitors

15,320 profile views
  1. One thing I am puzzled about is that Eset with default settings is supposed to warn and not block certificates with trust issues which is not happening:
  2. Firefox most certainly does: https://support.mozilla.org/en-US/kb/secure-website-certificate . I would assume the same for Chrome and Edge. This article gets into more detail: https://www.ssl.com/article/how-do-browsers-handle-revoked-ssl-tls-certificates/ . Their test in regards to RSA DV certs. yielded the following: As long as FireFox has OCSP enabled which is the default for certificate checking, it will detect a revoked intermediate cert.. Chrome doesn't detect because of bugs it appears: Edge will detect as long as its default settings haven't been modified:
  3. Did you do as @Marcosinstructed here: https://forum.eset.com/topic/27115-eset-140-dont-allow-software-download-from-microsoft-store-9x8007dd0a-urgent/?do=findComment&comment=127990 ?
  4. On a PC having connection issues, scroll down to this section, "3. Disable Automatically Detect Settings," in this article: https://www.techbout.com/err-tunnel-connection-failed-error-in-chrome-39692/ and do what is recommended. See if this resolves the issue.
  5. What Eset account are you referring to? The eStore account you set up when you purchased your license from the Eset Germany web site?
  6. Something is not right here in regards to this certificate status. I went to the GlobalSign web site here: https://support.globalsign.com/ca-certificates/intermediate-certificates/domainssl-intermediate-certificates , and downloaded this cert.. I really don't believe GlobalSign would still list a revoked cert. on their web site. Further confirmed by viewing the cert. itself: Additionally note that the thumbprint of this cert. does not match that of that shown by the independent scan of the URL by SSLLabs: It appears to me that this URL, https://intranet.agricom
  7. I will also note that this URL, https://www.agricom.cl/ , is OK. Appears to me that access is being attempted to an intranet domain of above via the Internet?
  8. Since there have been past complaints about Eset blocking IOBit web sites and software to boot, note the following also from the bleepingcomputer.com article. Obviously, the attacker used this vulnerability to exploit the IOBit web site.
  9. Are you disabling the Ethernet network connection as noted below? https://www.addictivetips.com/windows-tips/disable-an-ethernet-connection-windows-10/
  10. Elaborating on this attack, the details are as follows. The IOBit forum website was compromised by an attacker who gained admin access to the site. This allowed him to harvest e-mail addresses of forum users and plant a malicious download from the forum web site. The attacker then sent e-mails to IOBit forum users which stated they were the winners of a free one year license to an IOBit security product. At this point note that the e-mail would appear legit since the sender's address was legit. The following are excerpts from the bleepingcomputer.com article. The ransomware i
  11. The main thing to know about this attack was Windows Defender was bypassed since the malware created exclusions in WD to allow its malicious .dll to run undetected. Kapersky also didn't stop files being encrypted by the ransomware portion of the attack. Per a malwaretips.com poster: Waiting until someone does a detailed analysis on this puppy.
  12. A bit difficult to understand what you posted. Eset has three retail products with a firewall: 1. Internet Security 2. Smart Security Premium. 3. A legacy product called Smart Security. This has been superseded by Internet Security. Which of the above did you have installed previously? Which of the above did you recently install? Did you uninstall what you had installed previously prior to performing the new install?
  13. You can make an inquiry as to pricing here: https://www.eset.com/my/business/windows-security/
  14. The way to diagnose this is as follows: 1. Set Ethernet IPv4 connection back to Obtain DNS server automatically. 2. Reboot device or do via command prompt window, ipconfig /flushdns, ipconfig /release, and ipconfig /renew commands to reset IPv4 connection and acquire a new IPv4 lease. 3. Via command prompt window, enter ipconfig /all and note IPv4 DNS server assignment IP addresses. 4. Open Eset GUI and then Network protection. 5. Select Advanced. Then select Zones -> Edit. In the DNS section, do you see the same IPv4 DNS server addresses noted in the prior ip
  15. Are you referring to the Eset splash screen which just shows an image of Eset logo? If so, refer to below screen shot to disable its display at system start up time.
×
×
  • Create New...